default search action
QingPing Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j19]Xiaoxue Liu, Jiexin Zhang, Peidong Zhu, Qingping Tan, Wei Yin:
Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game. Comput. Secur. 102: 102138 (2021) - 2020
- [j18]Tun Li, Jun Ye, Qingping Tan:
Towards functional verifying a family of systemC TLMs. Frontiers Comput. Sci. 14(1): 53-66 (2020)
2010 – 2019
- 2019
- [j17]Nan Zhang, Jianjun Xu, Xiankai Meng, Qingping Tan:
EBSCN: An Error Backtracking Method for Soft Errors Based on Clustering and a Neural Network. IEEE Access 7: 147266-147279 (2019) - 2018
- [j16]Ping Zeng, Qingping Tan, Xiankai Meng, Haoyu Zhang, Jianjun Xu:
Modeling Complex Relationship Paths for Knowledge Graph Completion. IEICE Trans. Inf. Syst. 101-D(5): 1393-1400 (2018) - [j15]Ping Zeng, Qingping Tan, Haoyu Zhang, Xiankai Meng, Zhuo Zhang, Jianjun Xu, Yan Lei:
Character Feature Learning for Named Entity Recognition. IEICE Trans. Inf. Syst. 101-D(7): 1811-1815 (2018) - 2017
- [j14]Zhuo Zhang, Yan Lei, Qingping Tan, Xiaoguang Mao, Ping Zeng, Xi Chang:
Deep Learning-Based Fault Localization with Contextual Information. IEICE Trans. Inf. Syst. 100-D(12): 3027-3031 (2017) - 2016
- [c42]Jianjun Xu, Xiankai Meng, QingPing Tan, Jingling Xue:
Masking Soft Errors with Static Bitwise Analysis. APSEC 2016: 281-288 - 2015
- [c41]Yuanqiang Qiu, QingPing Tan, Jianjun Xu, Yuxiang Zhao:
An efficient approach to detect and correct control-flow errors for linear assembly. BMEI 2015: 560-565 - [c40]Tun Li, Jian Hu, Yang Guo, Sikun Li, QingPing Tan:
Equivalence checking of scheduling in high-level synthesis. ISQED 2015: 257-262 - 2014
- [c39]GuoRong Cao, QingPing Tan, Xiaoyan Xue, Wei Zhou, Yongyong Dai:
Service Adaptability Analysis across Semantics and Behavior Levels Based on Model Transformation. ER Workshops 2014: 273-282 - [c38]Jianjun Xu, QingPing Tan, Zeming Shao, Hong Ning:
Exploiting Narrow Data-Width to Mask Soft Errors in Register Files. SAFECOMP 2014: 125-138 - 2013
- [j13]Lei Xiong, Qingping Tan:
A dynamic approach to tolerate soft errors. Clust. Comput. 16(3): 359-366 (2013) - [j12]Jianli Li, Qingping Tan, Lanfang Tan:
Implementing Low-Cost Fault Tolerance via Hybrid Synchronous/Asynchronous Checks. J. Circuits Syst. Comput. 22(7) (2013) - [j11]Jianli Li, Jingling Xue, Xinwei Xie, Qing Wan, Qingping Tan, Lanfang Tan:
Epipe: A low-cost fault-tolerance technique considering WCET constraints. J. Syst. Archit. 59(10-D): 1383-1393 (2013) - [c37]Jianli Li, Qingping Tan:
SmartInjector: Exploiting intelligent fault injection for SDC rate analysis. DFTS 2013: 236-242 - [c36]Jianli Li, Qingping Tan, Lanfang Tan, Tongchuan Xin:
REE: Exploiting idempotent property of applications for fault detection and recovery. ICNC 2013: 1623-1627 - [c35]Jianjun Xu, Qingping Tan, Lanfang Tan, Huiping Zhou:
An instruction-level fine-grained recovery approach for soft errors. SAC 2013: 1511-1516 - 2012
- [j10]Feng Liu, QingPing Tan, Otmane Aït Mohamed:
Formal proof of integer adders using all-prefix-sums operation. Sci. China Inf. Sci. 55(9): 1949-1960 (2012) - [j9]Lanfang Tan, Qingping Tan, Jianjun Xu, Huiping Zhou:
Formal verification of signature-monitoring mechanisms by model checking. Comput. Sci. Inf. Syst. 9(4): 1431-1451 (2012) - [j8]Lei Xiong, Qingping Tan, Z. Shao:
Exploration of the effects of soft errors from dynamic software behaviours. IET Softw. 6(6): 514-523 (2012) - [j7]Lei Xiong, Qingping Tan:
An approach to analyze effects of soft errors on program level. Math. Comput. Model. 56(3-4): 69-79 (2012) - [c34]Lanfang Tan, Qingping Tan, Jianjun Xu:
Automatic instruction-level recovery by duplicated instructions and checkpointing. BMEI 2012: 1304-1307 - [c33]Lanfang Tan, Qingping Tan, Jianjun Xu, Jianli Li:
Transient-Error Detection and Recovery via Reverse Computation and Checkpointing. CLUSTER Workshops 2012: 170-178 - 2011
- [j6]Feng Liu, Xiaoyu Song, Qingping Tan, Gang Chen:
Formal Analysis of Hybrid Prefix/Carry-Select Arithmetic Systems. Comput. J. 54(6): 894-904 (2011) - [c32]Lei Xiong, Qingping Tan, Jianjun Xu:
Effects of Soft Error to System Reliability. AINA Workshops 2011: 204-209 - [c31]Jianjun Xu, Qingping Tan, Huiping Zhou:
Scheduling Instructions for Soft Errors in Register Files. DASC 2011: 305-312 - [c30]Lei Xiong, Qingping Tan:
An Approach to Analyze Effects of Soft Errors from Dynamic Software Behaviors. HPCC 2011: 796-801 - [c29]Jun Ye, Qingping Tan, Tun Li, GuoRong Cao:
FeatureVerilog: Extending Verilog to Support Feature-Oriented Programming. IPDPS Workshops 2011: 302-305 - [c28]Jun Ye, QingPing Tan, Tun Li:
Separation of communication and computation in SystemC/TLM modeling: A Feature-Oriented approach. ISQED 2011: 481-485 - [c27]Lei Xiong, Qingping Tan:
Data Flow Error Recovery with Checkpointing and Instruction-Level Fault Tolerance. PDCAT 2011: 79-85 - 2010
- [j5]Feng Liu, Qingping Tan, Gang Chen, Xiaoyu Song, Otmane Aït Mohamed, Ming Gu:
Field programmable gate array prototyping of end-around carry parallel prefix tree architectures. IET Comput. Digit. Tech. 4(4): 306-316 (2010) - [j4]Feng Liu, Qingping Tan, Gang Chen:
Formal proof of prefix adders. Math. Comput. Model. 52(1-2): 191-199 (2010) - [j3]Feng Liu, Xiaoyu Song, Qingping Tan, Gang Chen:
Formal Analysis of End-Around-Carry Adder in Floating-Point Unit. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 29(10): 1655-1659 (2010) - [c26]Jun Ye, QingPing Tan, Tun Li, Bin Wu, Yuanru Meng:
Feature-Oriented Refactoring Proposal for Transaction Level Models in SoCLib. FDL 2010: 22-27 - [c25]Feng Liu, QingPing Tan, Xiaoyu Song, Naeem Abbasi:
AOP-based high-level power estimation in SystemC. ACM Great Lakes Symposium on VLSI 2010: 353-356 - [c24]Feng Liu, QingPing Tan, Xiaoyu Song, Gang Chen:
Formal Proof for a General Architecture of Hybrid Prefix/Carry-Select Adders. ICA3PP (1) 2010: 193-204 - [c23]Guoliang Xu, Qingping Tan:
Constructing the Hybrid Dithering Matrix with Equal Clustered Dot Density. IMAGAPP/IVAPP 2010: 61-67 - [c22]Jianli Li, Qingping Tan, Jianjun Xu:
A Software-Implemented Configurable Control Flow Checking Method. PAAP 2010: 199-205 - [c21]Jianjun Xu, Qingping Tan, Wanwei Liu:
Estimating the Soft Error Vulnerability of Register Files via Interprocedural Data Flow Analysis. TASE 2010: 201-208
2000 – 2009
- 2009
- [c20]Feng Liu, Fariborz Fereydouni-Forouzandeh, Otmane Aït Mohamed, Gang Chen, Xiaoyu Song, QingPing Tan:
A Comparative Study of Parallel Prefix Adders in FPGA Implementation of EAC. DSD 2009: 281-286 - [c19]Jun Ye, Tun Li, QingPing Tan:
The application of Aspectual Feature Module in the development and verification of SystemC models. FDL 2009: 1-6 - [c18]Feng Liu, Otmane Aït Mohamed, Xiaoyu Song, QingPing Tan:
A case study on system-level modeling by aspect-oriented programming. ISQED 2009: 345-349 - [c17]Jianjun Xu, Qingping Tan, Rui Shen:
The Instruction Scheduling for Soft Errors Based on Data Flow Analysis. PRDC 2009: 372-378 - [c16]JinGang Xie, QingPing Tan, GuoRong Cao:
Modeling and Analyzing Web Service Behavior with Regular Flow Nets. WISM 2009: 309-319 - 2008
- [c15]Jianjun Xu, Qingping Tan, Rui Shen:
A Novel Optimum Data Duplication Approach for Soft Error Detection. APSEC 2008: 161-168 - [c14]Zhengjian Zhu, Qingping Tan, Peidong Zhu, Qianbing Zheng:
Security Broadcast Based on Linear Network Coding in WSN. CSSE (3) 2008: 919-922 - [c13]Hao Wu, Qingping Tan:
Utility-Function-Based Self-Adaptation in Elevator Group Control System. CSSE (1) 2008: 1158-1161 - [c12]Jianjun Xu, Rui Shen, Qingping Tan:
PRASE: An Approach for Program Reliability Analysis with Soft Errors. PRDC 2008: 240-247 - 2007
- [j2]Gang Chen, Xiaoyu Song, Feng Liu, QingPing Tan, Fei He:
A note on "a mapping algorithm for computer-assisted exploration in the design of embedded systems". ACM Trans. Design Autom. Electr. Syst. 12(4): 52 (2007) - [c11]Zhengjian Zhu, Qingping Tan, Peidong Zhu:
An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network. APNOMS 2007: 457-465 - [c10]Zhengjian Zhu, Qingping Tan, Peidong Zhu:
A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks. MSN 2007: 845-853 - 2006
- [c9]Yanping Yang, QingPing Tan, Yong Xiao, Feng Liu, Jinshan Yu:
Transform BPEL Workflow into Hierarchical CP-Nets to Make Tool Support for Verification. APWeb 2006: 275-284 - [c8]Jinshan Yu, Tun Li, Yang Guo, QingPing Tan:
Scheduling of Transactions Based on Extended Scheduling Timed Petri Nets for SoC System-Level Test-Case Generation. EUC 2006: 732-741 - [c7]Yanping Yang, QingPing Tan, Yong Xiao, Jinshan Yu, Feng Liu:
Exploiting Hierarchical CP-Nets to Increase the Reliability of Web Services Workflow. SAINT 2006: 116-122 - 2005
- [c6]Yanping Yang, QingPing Tan, Yong Xiao:
Verifying Web Services Composition. ER (Workshops) 2005: 354-363 - [c5]Yanping Yang, QingPing Tan, Yong Xiao:
Model Transformation Based Verification of Web Services Composition. GCC 2005: 71-76 - [c4]Yanping Yang, QingPing Tan, Yong Xiao:
Setup Algorithm of Web Service Composition. ICA3PP 2005: 139-148 - [c3]Yanping Yang, QingPing Tan, Yong Xiao:
Verifying web services composition based on hierarchical colored petri nets. IHIS 2005: 47-54 - [c2]Yanping Yang, QingPing Tan, Yong Xiao:
Transformation-Driven Development of Composite Web Services. ISPA Workshops 2005: 637-646 - [c1]Yanping Yang, QingPing Tan, Yong Xiao, Jinshan Yu, Feng Liu:
Verifying Web Services Composition: A Transformation-Based Approach. PDCAT 2005: 546-548
1990 – 1999
- 1997
- [j1]Qingping Tan:
A higher-order unification algorithm for inductive types and dependent types. J. Comput. Sci. Technol. 12(3): 231-243 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint